Reprogramming the World Cyberspace and the Geography of Global Order 

Total Page:16

File Type:pdf, Size:1020Kb

Reprogramming the World Cyberspace and the Geography of Global Order  P.J. BLOUNT Reprogramming the World Cyberspace and the Geography of Global Order This e-book is provided without charge via free download by E-International Relations (www.E-IR.info). It is not permitted to be sold in electronic format under any circumstances. If you enjoy our free e-books, please consider leaving a small donation to allow us to continue investing in open access publications: http://www.e-ir.info/about/donate/ i Reprogramming the World Cyberspace and the Geography of Global Order P.J. BLOUNT ii E-International Relations www.E-IR.info Bristol, England 2019 ISBN 978-1-910814-52-9 This book is published under a Creative Commons CC BY-NC 4.0 license. You are free to: • Share – copy and redistribute the material in any medium or format • Adapt – remix, transform, and build upon the material Under the following terms: • Attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. • Non-Commercial – You may not use the material for commercial purposes. Any of the above conditions can be waived if you get permission. Please contact [email protected] for any such enquiries, including for licensing and translation requests. Other than the terms noted above, there are no restrictions placed on the use and dissemination of this book for student learning materials/scholarly use. Production: Michael Tang Cover Image: spainter_vfx via Shutterstock A catalogue record for this book is available from the British Library. iii E-IR Open Access Series Editors: Stephen McGlinchey Books Editor: Cameran Clayton Editorial assistance: Kaiqing Su, Adeleke Olumide Ogunnoiki, Daniele Irandoost, Sana Salman, Xolisile Ntuli and Christy Davidson-Stearn. E-IR Open Access is a series of scholarly books presented in a format that preferences brevity and accessibility while retaining academic conventions. Each book is available in print and digital versions, and is published under a Creative Commons license. Free versions of all of our books, including this one, are available on the E-International Relations website. Find out more at: http://www.e-ir.info/publications About the E-International Relations website E-International Relations (www.E-IR.info) is the world’s leading open access website for students and scholars of international politics, reaching over 3 million unique readers annually. E-IR’s daily publications feature expert articles, blogs, reviews and interviews – as well as student learning resources. The website is run by a registered non-profit organisation based in Bristol, UK and staffed with an all-volunteer team of students and scholars. iv Acknowledgements This research has been supported throughout by a number of individuals. Scholarly support came from Prof. Jean-Marc Coicaud, Prof. Yale Ferguson, Prof. Ellen Goodman, and Prof. David Post. Each of these individuals gave valuable feedback during the drafting process. In addition to their support, the scholarship of each of these individuals played an important role in the final product. I would also like to thank Prof. Joanne Gabrynowicz who asked me to develop an International Telecommunications Law class at the University of Mississippi School of Law. The material gathered for that course was the bedrock on which this research is built. Additionally, I would like to thank T.J. Koger who helped me gather the materials that made up the initial syllabi in this class. Numerous friends who, though not subject matter experts, engaged repeatedly with me in discussions of my topic and posed challenging questions that shaped my thinking. In particular, I would like to thank: Wil Cook, David Molina, Christopher Hearsey, Jeff Benvenuto, Matthew Holly, and James Woods. My family for their support. My parents, Percy and Sandra Blount, provided me with a computer well before they were household items (a Commodore 64 is the first computer I remember), but also succumbed to my requests to get an Internet connection in 1994. One might argue that I’ve been thinking about this book ever since. Finally, I’d like to thank my wife, Kelly Blount, for tolerating this project and its associated stacks of papers and books. I could not have done it without you, my love. v vi Reprogramming the World Contents INTRODUCTION 1. THE PROBLEM OF NEW SPACES 2 PART I: NETWORKED GEOGRAPHY 2. CYBER LANDSCAPES 16 3. LEGAL TERRAINS 40 4. POLITICAL PLACES 63 INTERLUDE 5. THE NOMOS OF CYBERSPACE 79 PART II: DIGITAL ENCOUNTERS 6. CONFLICTING TERRITORIES 95 7. STANDARDIZING AUTHORITY 115 8. UNBORDERED RIGHTS 134 CONCLUSION 9. REPROGRAMMING THE WORLD 156 BIBLIOGRAPHY 170 NOTE ON INDEXING 206 vii viii Reprogramming the World Table of Abbreviations AOL America Online CB Citizen Band Radio DBS Direct Broadcasting Satellite DMCA Digital Millennium Copyright Act DNS Domain Name System FTP File Transfer Protocol HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure IANA Internet Assigned Numbers Authority ICANN Internet Corporation for Assigned Names and Numbers ICP Internet Content Provider IETF Internet Engineering Task Force IGC Internet Governance Communities IO International Organization IoT Internet of Things IRC Internet Relay Chat ISOC Internet Society ISP Internet Service Provider ITAR International Traffic in Arms Regulations ITU International Telecommunication Union NGO Nongovernmental Organization NSA National Security Agency NSF National Science Foundation MNC Multinational Corporation PCLOB Privacy and Civil Liberties Oversight Board PGP Pretty Good Privacy PP-14 ITU Plenipotentiary Conference 2014 PSP President’s Surveillance Program R2P Responsibility to Protect TCP/IP Transfer Control Protocol/Internet Protocol TV Television UDHR Universal Declaration of Human Rights UDRP Universal Dispute Resolution Policy UK United Kingdom UN United Nations UNCOPUOS UN Committee on the Peaceful Uses of Outer Space UNGA General Assembly URI Uniform Resource Identifier URL Uniform Resource Locater US United States USML United States Munitions List ix W3C World Wide Web Consortium WWW World Wide Web 1 Reprogramming the World Introduction “Sir, line your borders with soldiers, arm them with bayonets to keep out all the dangerous books which may appear, and these books, excuse the expression, will pass between their legs and fly over their heads and reach us.” Denis Diderot The Problem of New Spaces 2 1 The Problem of New Spaces In June of 2013, Edward Snowden ignited a global debate about the nature of government surveillance in the electronic sphere. The government documents leaked by the former National Security Agency (NSA) contractor revealed mass electronic surveillance by the United States and a number of partner governments such as the United Kingdom.1 These leaks raised serious legal, political, and ethical questions about the nature of individual privacy in the face of secret government surveillance programs. The dominant narrative of the Snowden affair, as it unfolded in the media, was one of expanding government power impinging on individual rights in the electronic sphere. There was also a counter narrative involved in this incident that exhibits a complementary ebbing of the state’s power to control information. Perhaps the best illustration of this counter narrative is the farcical vignette that takes place in the basement of The Guardian’s building in London. In July of 2013, “a senior editor and a Guardian computer expert used angle grinders and other tools to pulverize the hard drives and memory chips on which the encrypted” leaks from Snowden were stored.2 These two men were overseen by note-taking government officials who had ordered the destruction of the equipment.3 This scene functions as a tableau that illustrates the core issue that Snowden exposed: the increasing dissonance Cyberspace causes in the application of state power. In The Guardian’s basement, the state appears in physical form and asserts a right to control information based on physical realities. It uses legal and physical coercion to destroy a machine that contains information. 1 Greenwald & Ball, “The Top Secret Rules That Allow NSA to Use US Data without a Warrant,” (2014); Hopkins & Borger, “Exclusive: NSA Pays £100m in Secret Funding for GCHQ,” (2013); and Dorling, “Snowden Reveals Australia’s Links to US Spy Web,” (2013). 2 Borger, “NSA Files: Why The Guardian in London Destroyed Hard Drives of Leaked Files,” (2014). 3 Id. 3 Reprogramming the World In the pre-digital era, the same tableau might have been one of police destroying a printing press; the destruction of a printing press being an efficient means of containing information and destroying a message. In the digital age, the UK government remained insistent on this same method of control. It physically destroyed the machinery of the newspaper, despite the fact “that other copies of the files existed outside the country and that The Guardian was neither the sole recipient nor steward of the files leaked by Snowden.”4 The effectiveness of the state’s power to coerce is limited within a specific space and time, because the object of its control existed outside the space of the state. More specifically, not only was this information outside of the space of the UK, it existed outside the space of any state. The leaks themselves existed in a global space. In the past, the rationale for destroying the printing press was linked to its locality and its central position in the distribution network for its messages. Now, the message is no longer linked to the locality of the machine, and in McLuhan’s word “the medium” has been transfused with “the message.”5 As a result, the state’s ability to control information is bounded, and The Guardian “preferred to destroy [its] copy rather than hand it back to them or allow the courts to freeze [its] reporting.”6 While the individuals using the angle grinders are helpless in the face of the state, the state is helpless in the face of technology: reporting on the leaks continued.
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • The Potential of Leaks: Mediation, Materiality, and Incontinent Domains
    THE POTENTIAL OF LEAKS: MEDIATION, MATERIALITY, AND INCONTINENT DOMAINS ALYSSE VERONA KUSHINSKI A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN COMMUNICATION AND CULTURE YORK UNIVERSITY TORONTO, ONTARIO AUGUST 2019 © Alysse Kushinski, 2019 ABSTRACT Leaks appear within and in between disciplines. While the vernacular implications of leaking tend to connote either the release of texts or, in a more literal sense, the escape of a fluid, the leak also embodies more poetic tendencies: rupture, release, and disclosure. Through the contours of mediation, materiality, and politics this dissertation traces the notion of “the leak” as both material and figurative actor. The leak is a difficult subject to account for—it eludes a specific discipline, its meaning is fluid, and its significance, always circumstantial, ranges from the entirely banal to matters of life and death. Considering the prevalence of leakiness in late modernity, I assert that the leak is a dynamic agent that allows us to trace the ways that actors are entangled. To these ends, I explore several instantiations of “leaking” in the realms of media, ecology, and politics to draw connections between seemingly disparate subjects. Despite leaks’ threatening consequences, they always mark a change, a transformation, a revelation. The leak becomes a means through which we can challenge ourselves to reconsider the (non)functionality of boundaries—an opening through which new possibilities occur, and imposed divisions are contested. However, the leak operates simultaneously as opportunity and threat—it is always a virtual agent, at once stagnant and free flowing.
    [Show full text]
  • North Korean Cyber Capabilities: in Brief
    North Korean Cyber Capabilities: In Brief Emma Chanlett-Avery Specialist in Asian Affairs Liana W. Rosen Specialist in International Crime and Narcotics John W. Rollins Specialist in Terrorism and National Security Catherine A. Theohary Specialist in National Security Policy, Cyber and Information Operations August 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44912 North Korean Cyber Capabilities: In Brief Overview As North Korea has accelerated its missile and nuclear programs in spite of international sanctions, Congress and the Trump Administration have elevated North Korea to a top U.S. foreign policy priority. Legislation such as the North Korea Sanctions and Policy Enhancement Act of 2016 (P.L. 114-122) and international sanctions imposed by the United Nations Security Council have focused on North Korea’s WMD and ballistic missile programs and human rights abuses. According to some experts, another threat is emerging from North Korea: an ambitious and well-resourced cyber program. North Korea’s cyberattacks have the potential not only to disrupt international commerce, but to direct resources to its clandestine weapons and delivery system programs, potentially enhancing its ability to evade international sanctions. As Congress addresses the multitude of threats emanating from North Korea, it may need to consider responses to the cyber aspect of North Korea’s repertoire. This would likely involve multiple committees, some of which operate in a classified setting. This report will provide a brief summary of what unclassified open-source reporting has revealed about the secretive program, introduce four case studies in which North Korean operators are suspected of having perpetrated malicious operations, and provide an overview of the international finance messaging service that these hackers may be exploiting.
    [Show full text]
  • Cyberattack Attribution
    CYBERATTACK ATTRIBUTION A BLUEPRINT FOR PRIVATE SECTOR LEADERSHIP RESEARCH FELLOWS SENIOR RESEARCH FELLOWS Justin Collins Allison Anderson Cameron Evans Stacia Lee Chris Kim Kayley Knopf FACULTY LEAD Selma Sadzak Jessica Beyer Nicholas Steele Julia Summers Alison Wendler This report is a product of the Applied Research Program in the Henry M. Jackson School of International Studies at the University of Washington. The Applied Research Program matches teams of top-achieving Jackson School students with private and public sector organizations seeking dynamic, impactful, and internationally-minded analyses to support their strategic and operational objectives. For more information about the Applied Research Program please contact us at [email protected]. Executive Summary After three decades of development, adoption, and innovation, the Internet stands at the core of modern society. The same network that connects family and friends across the world similarly ties together all aspects of daily life, from the functioning of the global economy to the operation of governments. The digitization of daily life is the defining feature of the 21st century. While the pervasiveness of Internet-enabled technology brings significant benefits, it also brings serious threats—not only to our economy and safety, but also to our trust in computer systems.1 The Internet is central to modern life, yet major state-sponsored cyberattacks persist in disrupting Internet access and function. These attacks undermine faith in government and public trust in democratic institutions. Attribution attempts to date have been unable to deter states from building malicious code for even greater destructive capabilities. In response, we propose the formation of an attribution organization based on international private sector coordination.
    [Show full text]
  • The Views of the U.S. Left and Right on Whistleblowers Whistleblowers on Right and U.S
    The Views of the U.S. Left and Right on Whistleblowers Concerning Government Secrets By Casey McKenzie Submitted to Central European University Department of International Relations and European Studies In partial fulfillment of the requirements for the degree of Master of Arts Supervisor: Professor Erin Kristin Jenne Word Count: 12,868 CEU eTD Collection Budapest Hungary 2014 Abstract The debates on whistleblowers in the United States produce no simple answers and to make thing more confusing there is no simple political left and right wings. The political wings can be further divided into far-left, moderate-left, moderate-right, far-right. To understand the reactions of these political factions, the correct political spectrum must be applied. By using qualitative content analysis of far-left, moderate-left, moderate-right, far-right news sites I demonstrate the debate over whistleblowers belongs along a establishment vs. anti- establishment spectrum. CEU eTD Collection i Acknowledgments I would like to express my fullest gratitude to my supervisor, Erin Kristin Jenne, for the all the help see gave me and without whose guidance I would have been completely lost. And to Danielle who always hit me in the back of the head when I wanted to give up. CEU eTD Collection ii Table of Contents Abstract ....................................................................................................................................... i Acknowledgments.....................................................................................................................
    [Show full text]
  • USA V. Bradley (Chelsea) Manning: Army Court of Appeals Affirms Prior
    UNITED STATES ARMY COURT OF CRIMINAL APPEALS Before CAMPANELLA, CELTNIEKS, and HAGLER Appellate Military Judges UNITED STATES, Appellee v. Private First Class BRADLEY E. MANNING (nka CHELSEA E. MANNING) United States Army, Appellant ARMY 20130739 U.S. Army Military District of Washington Denise R. Lind, Military Judge Colonel Corey J. Bradley, Staff Judge Advocate (pretrial) Colonel James R. Agar, II, Staff Judge Advocate (post-trial) For Appellant: Vincent J. Ward, Esquire (argued); Captain J. David Hammond, JA; Lieutenant Colonel Jonathan F. Potter, JA; Vincent J. Ward, Esquire; Nancy Hollander, Esquire (on brief); Lieutenant Colonel Christopher D. Carrier, JA. Amicus Curiae: For Electronic Frontier Foundation, National Association of Criminal Defense Lawyers, and the Center for Democracy and Technology: Jamie Williams, Esquire; Andrew Crocker, Esquire (on brief). For Amnesty International Limited: John K. Keker, Esquire; Dan Jackson, Esquire; Nicholas S. Goldberg, Esquire (on brief). For American Civil Liberties Union Foundation: Esha Bhandari, Esquire; Dror Ladin, Esquire; Ben Wizner, Esquire (on brief). For Open Society Justice Initiative: James Goldston, Esquire; Sandra Coliver, Esquire (on brief). For Appellee: Captain Catherine M. Parnell, JA (argued); Colonel Mark H. Sydenham, JA; Lieutenant Colonel A.G. Courie III, JA; Major Steve T. Nam, JA; Captain Timothy C. Donahue, JA; Captain Jennifer A. Donahue, JA; Captain Samuel E. Landes, JA (on brief); Captain Allison L. Rowley, JA. 31 May 2018 --------------------------------- OPINION OF THE COURT --------------------------------- MANNING—ARMY 20130739 CAMPANELLA, Senior Judge: A military judge sitting as a general court-martial convicted appellant, in accordance with her pleas, of one specification of violating a lawful general regulation and two specifications of general disorders in violation of Articles 92 and 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C.
    [Show full text]
  • The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty
    In Collaboration with Kearney The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty WHITE PAPER JULY 2021 Images: Getty Images, Unsplash Contents Foreword 3 Executive summary 4 1 Disruption drives a rethink 5 2 Resilience in action 8 2.1 Getting to grips with disruption 8 2.2 Introducing the resiliency compass 8 2.3 Who are the resilience leaders? 10 3 Setting the right course with the resiliency compass 11 4 Call for action: global coordination for the long term 14 Methodology 15 Contributors 16 Acknowledgements 17 Endnotes 19 © 2021 World Economic Forum. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, including photocopying and recording, or by any information storage and retrieval system. The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty 2 July 2021 The Resiliency Compass: Navigating Global Value Chain Disruption in an Age of Uncertainty Foreword Unlocking the future of cooperation, resilience and prosperity for global value chains. Francisco Betti Per Kristian Hong Head of Shaping the Future of Managing Director and Advanced Manufacturing and Partner, Strategic Operations Production, Member of the and World Economic Forum Executive Committee, World Relationship Lead, Kearney Economic Forum COVID-19 has kept manufacturing companies systems if both the global economy and companies beyond busy for many months and the challenges are to successfully navigate future disruptions that are far from over, from ensuring safety and may affect global value chains. security on the shop floor and facing supply and demand disruptions to accelerating digital In 2020, the World Economic Forum, in transformation and reskilling to build resilience.
    [Show full text]
  • Vp01 16¢63뼉 Olor
    Discontinuance of Publication To our readers, First and foremost, I, as the president of Yonhap News Agency, would like to give our readers many thanks for the deep interest shown in our Vantage Point magazine for many years. With your great interest and encouragement, Yonhap has done its utmost to make Vantage Point, South Korea's sole North Korea-only monthly in English, a quality magazine over the years. However, Yonhap has very regrettably decided to discontinue the publication of the maga- zine, making the January issue in 2016 its last. This discontinuance, however, will never mean weakening Yonhap’s North Korea news ser- vice. On the contrary, Yonhap, as a leading news agency in South Korea, has the grave obligation to play a part in helping materialize the Korean people’s ardent wish for the reunification of the Korean Peninsula by providing our readers at home and abroad with accurate news on the reality of the communist North and the South Korean government’s North Korea policy. Hence, Yonhap promises to continuously meet our Vantage Point readers’ keen interest in and high demand for stories on Korean Peninsula issues by providing you with a quicker, fairer, more accurate and stronger North Korean news service via its Web page (www.yonhapnews.co.kr). I would like to express my deep appreciation to our faithful readers once again, and hope you will continuously maintain interest in Korean issues down the road. Best regards, Park No-hwang President-publisher Yonhap News Agency 폐간사 독자여러분들에게, 우선 그동안 연합뉴스 Vantage Point를 애독해주신 독자 여러분들에게 깊은 감사의 말씀을 드립니다 그동안 연합뉴스는 독자 여러분들의 높은 관심과 격려 속에서 한국의 유일한 북한 전문 영문월간지인 Vantage Point를 품격있는 잡지로 만들기 위해 최선 을 다해왔습니다.
    [Show full text]
  • "Splinternet" – Danger for Our Citizens, Businesses and Society?
    "Splinternet" – Danger for our citizens, businesses and society? Once upon a time, there was the World Wide Web (www). Just as it was invented by Sir Tim Berners-Lee. John Perry Barlow wrote the "Declaration of the Independence of Cyberspace" in 1996. The Internet was a great promise of freedom. It worked like a continuation of the Gutenberg invention, the printing press: the Internet gave a voice to all citizens whose views and attitudes were suppressed by the media and elites. This had and has great political consequences. 30 years later the opinion about the internet changed: It was thought that monopoly companies like Google, Facebook, etc. control Big Data and Artificial Intelligence, and therefore control us. However, politics followed suit and began to regulate. The concern now is that the state will disenfranchise citizens and restrict companies. There is a fear of new totalitarian regimes. And in this situation, the Internet ("splinternet") is increasingly fragmented. National "Internet" networks are emerging. States treat the Internet as an extension of their national territory. The most recent example is Russia, where Kremlin laws ensure that national Internet traffic goes through state nodes and the state has the right to shut down the global Internet: a sort of digital Iron Curtain. The champion of the national Internet is China. The state monitors and controls Internet content, blocks foreign services and companies (like Facebook) and replaces them with national services and companies that are in line with the Communist Party. The "Great Firewall" is successful. The number of states imitating China's Internet policy is growing: Iran, North Korea, Cuba, Turkey, Saudi Arabia, but also Thailand and Vietnam etc.
    [Show full text]
  • U.S. Charges Hacker with Illegally Accessing New York Times Computer Network
    September 9, 2003 U.S. Department of Justice United States Attorney Southern District of New York James B. Comey Contact: Marvin, Smilon, Herbert Hadad, Michael Kulstad Public Information Office (212) 637-2600 Mark F. Mendelsohn (212) 637-2487 FBI Joseph A. Valiquette James, Margolin (212) 384-2715, 2720 U.S. Charges Hacker with Illegally Accessing New York Times Computer Network JAMES B. COMEY, United States Attorney for the Southern District of New York, and PASQUALE D’AMURO, the Assistant Director in Charge of the New York Office of the Federal Bureau of Investigation, announced that ADRIAN LAMO was charged in Manhattan federal court with hacking into the internal computer network of the New York Times. LAMO surrendered today to federal authorities in Sacramento, California. According to a two-count criminal Complaint unsealed today in Manhattan federal court, on February 26, 2002, LAMO hacked into the New York Times’ internal computer network and accessed a database containing personal information (including home telephone numbers and Social Security numbers) for over 3,000 contributors to the New York Times’ Op-Ed page. As described in the Complaint, soon after being notified of the computer intrusion, the New York Times conducted an internal investigation and confirmed that an intruder had in fact hacked into its network and accessed the personal information for contributors to the Op-Ed page. In addition, according to the Complaint, the Times determined that the intruder had added an entry to that database for “Adrian Lamo,” listing personal information including LAMO’s cellular telephone number (415) 505-HACK, and a description of his areas of expertise as “computer hacking, national security, communications intelligence.” The Complaint states that the New York Times later learned that while inside its internal network, LAMO had set up five fictitious user identification names and passwords (“userids/passwords”) under the New York Times’ account with LexisNexis, an online subscription service that provides legal, news and other information for a fee.
    [Show full text]